KNOWING THE CHALLENGES OF APPLYING KMS PICO: MALWARE AND STABILITY CONSIDERATIONS